Preface ....................................................... ix
Chapter 1: Revealing the Hidden World of the Dark Web:
Social Media Forums and Videos .................................. 1
1.1 Introduction ............................................... 2
1.2 The Dark Web Forum Portal .................................. 3
1.3 The Video Portal .......................................... 13
1.4 Conclusion and Future Directions .......................... 25
Acknowledgments ................................................ 26
References ..................................................... 27
Chapter 2: Proactive Cyber Defense ............................. 29
2.1 Introduction .............................................. 29
2.2 Proactive Filters ......................................... 31
2.3 Early Warning ............................................. 40
2.4 Concluding Remarks ........................................ 48
Acknowledgments ................................................ 49
References ..................................................... 49
Chapter 3: Privacy-Preserving Social Network Integration,
Analysis, and Mining ........................................... 57
3.1 Social Network Analysis and Mining ........................ 51
3.2 Privacy Preservation ...................................... 52
3.3 Information Integration and Privacy Preservation for
SNAM ...................................................... 54
3.4 Conclusion ................................................ 64
References ..................................................... 64
Chapter 4: A Digraph Model for Risk Identification and
Management in SCADA Systems .................................... 69
4.1 Introduction .............................................. 69
4.2 Background ................................................ 70
4.1 A Digraph Model of SCADA Systems .......................... 71
4.4 Conclusions ............................................... 82
References ..................................................... 83
Chapter 5: High-Level Architecture and Design of a Decision
Engine for Marine Safety and Security .......................... 85
5.1 Introduction .............................................. 86
5.2 Background ................................................ 87
5.3 Conceptual Design ......................................... 91
5.4 Formal Representation .................................... 100
5.5 Application .............................................. 103
5.6 Conclusions and Future Work .............................. 103
Acknowledgments ............................................... 104
References .................................................... 104
Chapter 6: Criminal Identity Resolution Using Personal and
Social Identity Attributes: A Collective Resolution Approach .. 707
6.1 Introduction ............................................. 107
6.2 Related Work ............................................. 109
6.3 A Collective Identity Resolution Approach ................ 113
6.4 Experiments .............................................. 119
6.5 Concluding Remarks ....................................... 123
References .................................................... 123
Chapter 7: Al Qaeda Terrorist Financing ....................... 725
7.1 Importance of Cutting Terrorist Financing ................ 125
7.2 Description of Al Qaeda's Financial Network .............. 126
7.3 History and Development of Al Qaeda and its Financial
Network .................................................. 128
7.4 Organizational Structure: Control Over Finances Within
Al Qaeda ................................................. 132
7.5 Al Qaeda's Portfolio and Sources of "Revenues" ........... 135
7.6 Methods of Transferring and Storing Funds ................ 143
References .................................................... 150
Chapter 8: Study on Covert Networks of Terrorists Based on
Interactive Relationship Hypothesis ........................... 755
8.1 Introduction ............................................. 156
8.2 Relevant Works ........................................... 157
8.3 Initial Network Construction ............................. 158
8.4 Network Refinement Based on Interaction Relation
Hypothesis ............................................... 164
8.5 Relationship Network Refinement and Final Relationship
Network of Terrorist Organizations and Incidents ......... 171
8.6 Analysis and Verification ................................ 174
8.7 Conclusions .............................................. 178
Acknowledgments ............................................... 179
References .................................................... 179
Chapter 9: Incorporating Data and Methodologies for
Knowledge Discovery for Crime ................................. 181
9.1 Introduction ............................................. 182
9.2 Steps Involved in Crime Investigation .................... 182
9.3 Data Sources for Crime Data Mining and Investigation ..... 183
9.4 The Four Types of Knowledge Discovery .................... 186
9.5 Knowledge Discovery Methodologies for Crime Data ......... 192
9.6 Methodologies Applied to Knowledge Discovery Types ....... 196
9.7 Conclusion ............................................... 197
References .................................................... 197
Index ......................................................... 199
|